Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities

N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
The fifth generation (5G) wireless technologies serve as a key propellent to meet the
increasing demands of the future Internet of Things (IoT) networks. For wireless …

Markov decision processes with applications in wireless sensor networks: A survey

MA Alsheikh, DT Hoang, D Niyato… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The
devices cooperate to monitor one or more physical phenomena within an area of interest …

[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

KY Tsao, T Girdler, VG Vassilakis - Ad Hoc Networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …

GLR-SEI: green and low resource specific emitter identification based on complex networks and fisher pruning

Y Lin, H Zha, Y Tu, S Zhang, W Yan… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
Better neural networks, more powerful computer hardware and signal Big Data make deep
learning increasingly important in Specific Emitter Identification (SEI). However, its …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities

S Zhang, D Zhu, Y Liu - Computer Networks, 2024 - Elsevier
With the commercial deployment of the 5G system, researchers from both academia and
industry are moving attention to the blueprint of the 6G system. The space-air-ground-sea …

Distributed database management techniques for wireless sensor networks

O Diallo, JJPC Rodrigues, M Sene… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In sensor networks, the large amount of data generated by sensors greatly influences the
lifetime of the network. To manage this amount of sensed data in an energy-efficient way …

Denial-of-service attacks on wireless sensor network and defense techniques

MNU Islam, A Fahmin, MS Hossain… - Wireless Personal …, 2021 - Springer
The basic characteristic of a wireless sensor network is to sense the environment and to
gather different types of data. It is used in various vital sectors, such as military, health-care …

Review on security issues and attacks in wireless sensor networks

J Malhotra - … Journal of Future Generation Communication and …, 2015 - earticle.net
Wireless sensor network is a collection of sensor nodes with limited processor and limited
memory unit embedded in it. Sensor networks are used in wide range of applications such …

A novel cancelable facehashing technique based on non-invertible transformation with encryption and decryption template

A Sardar, S Umer, C Pero, M Nappi - IEEE Access, 2020 - ieeexplore.ieee.org
A novel cancelable FaceHashing technique based on non-invertible transformation with
encryption and decryption template has been proposed in this paper. The proposed system …